Data Security
Last Updated: January 2025 This Data Security Policy describes the security measures BlockSecOps implements to protect your data. --- We implement multiple...
Data Security Policy
Last Updated: January 2025
This Data Security Policy describes the security measures BlockSecOps implements to protect your data.
1. Security Principles
1.1 Defense in Depth
We implement multiple layers of security controls to protect data at every level of our infrastructure.
1.2 Least Privilege
Access to data and systems is restricted to the minimum necessary for each role.
1.3 Security by Design
Security is integrated into every stage of our development and operations processes.
1.4 Continuous Improvement
We regularly assess and improve our security posture based on evolving threats and best practices.
2. Data Encryption
2.1 Encryption at Rest
All stored data is encrypted:
- Algorithm: AES-256
- Key Management: Regularly rotated keys
- Scope: All databases, backups, and file storage
2.2 Encryption in Transit
All data in motion is encrypted:
- Protocol: TLS 1.3
- Cipher Suites: Strong, modern ciphers only
- Certificate: Valid, trusted certificates
2.3 Customer-Managed Keys (Enterprise)
Enterprise customers can:
- Bring their own encryption keys (BYOK)
- Use HSM-backed key management
- Maintain complete key custody
3. Access Control
3.1 Authentication
- Multi-factor authentication (MFA) available
- SSO integration (SAML 2.0, OIDC)
- Strong password requirements
- Session timeout controls
3.2 Authorization
- Role-based access control (RBAC)
- Granular permissions per resource
- Principle of least privilege
- Regular access reviews
3.3 Administrative Access
- Just-in-time access for operations
- Multi-person approval for sensitive actions
- All access logged and audited
- Background checks for personnel
4. Infrastructure Security
4.1 Cloud Security
- Hosted on SOC 2 compliant cloud providers
- Virtual private cloud (VPC) isolation
- Network segmentation
- DDoS protection
4.2 Network Security
- Web Application Firewall (WAF)
- Intrusion detection systems
- Network traffic monitoring
- Regular penetration testing
4.3 Server Security
- Hardened operating systems
- Automated security patching
- Immutable infrastructure
- Container isolation
5. Application Security
5.1 Secure Development
- Secure coding standards
- Code review requirements
- Static analysis scanning
- Dependency vulnerability scanning
5.2 Vulnerability Management
- Regular security assessments
- Bug bounty program
- Responsible disclosure process
- Timely patch deployment
5.3 Change Management
- Version-controlled deployments
- Staging environment testing
- Rollback capabilities
- Change audit trails
6. Data Protection
6.1 Data Classification
We classify data by sensitivity:
- Public: Marketing materials
- Internal: Operational data
- Confidential: User data, contracts
- Restricted: Credentials, keys
6.2 Data Handling
- Confidential data encrypted everywhere
- No sensitive data in logs
- Secure data destruction
- Data anonymization where possible
6.3 Backup and Recovery
- Regular automated backups
- Encrypted backup storage
- Tested recovery procedures
- Geographic redundancy (Enterprise)
7. Incident Response
7.1 Detection
- 24/7 security monitoring
- Automated threat detection
- Anomaly alerting
- User activity monitoring
7.2 Response Process
- Detection: Identify potential incident
- Containment: Limit impact
- Investigation: Determine scope and cause
- Remediation: Fix vulnerabilities
- Recovery: Restore normal operations
- Post-Incident: Learn and improve
7.3 Notification
- Customers notified within 72 hours of confirmed breach
- Regulatory authorities notified as required
- Ongoing updates during incidents
- Post-incident reports provided
8. Compliance
8.1 Certifications
- SOC 2 Type II
- Annual third-party audits
- Penetration testing reports available (under NDA)
8.2 Regulatory Compliance
- GDPR (European data protection)
- CCPA (California privacy)
- Industry-specific requirements on request
8.3 Compliance Reports
Enterprise customers can request:
- SOC 2 reports
- Penetration test summaries
- Compliance attestations
- Security questionnaire responses
9. Physical Security
9.1 Data Centers
Our cloud providers maintain:
- 24/7 security personnel
- Biometric access controls
- Video surveillance
- Environmental controls
9.2 Offices
BlockSecOps offices feature:
- Access control systems
- Visitor management
- Clean desk policies
- Secure document disposal
10. Personnel Security
10.1 Hiring
- Background checks for all employees
- Reference verification
- Security awareness training
- Confidentiality agreements
10.2 Ongoing
- Annual security training
- Phishing simulations
- Access reviews
- Exit procedures for departing employees
10.3 Third Parties
Vendors and contractors must:
- Sign security agreements
- Meet our security standards
- Undergo security assessment
- Limited, monitored access
11. Your Responsibilities
11.1 Account Security
You should:
- Use strong, unique passwords
- Enable multi-factor authentication
- Protect your API keys
- Review account activity regularly
11.2 Data Security
You should:
- Not share sensitive data unnecessarily
- Use encryption for sensitive exports
- Follow your organization's security policies
- Report suspicious activity
11.3 Team Management
Administrators should:
- Grant minimum necessary permissions
- Remove access for departing members
- Review access regularly
- Enable appropriate security settings
12. Security Features by Plan
| Feature | Free | Developer | Startup | Professional | Enterprise |
|---|---|---|---|---|---|
| Encryption at rest | ✓ | ✓ | ✓ | ✓ | ✓ |
| Encryption in transit | ✓ | ✓ | ✓ | ✓ | ✓ |
| MFA | ✓ | ✓ | ✓ | ✓ | ✓ |
| Audit logs | 30 days | 90 days | 90 days | 1 year | Configurable |
| SSO (SAML) | - | - | - | ✓ | ✓ |
| Custom keys (BYOK) | - | - | - | - | ✓ |
| Dedicated support | - | - | - | - | ✓ |
| SLA | - | - | - | 99.9% | 99.99% |
13. Contact Security Team
13.1 Security Inquiries
For security questions:
Email: [email protected]
13.2 Vulnerability Reports
To report a vulnerability:
Email: [email protected]
PGP Key: Available on request
13.3 Incident Reporting
To report a security incident:
Email: [email protected]
Emergency: Contact your TAM (Enterprise)
14. Changes to This Policy
We review and update this policy annually or as needed. Changes will be communicated to users.